SECURITY

Security Policies

Protecting our data, systems, and workplace through comprehensive security measures.

Information Security

Protecting sensitive company and client information from unauthorized access or disclosure.

  • All passwords must be strong and changed every 90 days
  • Never share passwords or access credentials with others
  • Use multi-factor authentication (MFA) where available
  • Encrypt sensitive data both in transit and at rest
  • Report any suspected security breaches immediately
  • Do not access systems or data outside your authorized scope
  • Log out of systems when not in use
  • Follow data classification and handling procedures

Physical Security

Maintaining physical security of the workplace and company assets.

  • Wear your ID badge at all times while on company premises
  • Do not allow unauthorized persons into restricted areas
  • Report lost or stolen access cards immediately
  • Lock workstations and secure documents when away from desk
  • Do not leave sensitive documents unattended
  • Follow visitor management procedures
  • Secure company equipment and devices
  • Report any suspicious activity or persons to security

Data Protection

Safeguarding personal and business data in compliance with regulations.

  • Handle personal data in accordance with privacy regulations
  • Do not store sensitive data on personal devices without approval
  • Use approved cloud storage and backup solutions
  • Regularly backup important work data
  • Do not send sensitive information via unsecured channels
  • Follow data retention and disposal policies
  • Report any data loss or unauthorized access immediately
  • Obtain consent before sharing personal information

Network & System Security

Protecting our network infrastructure and systems from cyber threats.

  • Connect only approved devices to company networks
  • Keep all software and systems updated with latest security patches
  • Do not install unauthorized software or applications
  • Use company-approved antivirus and security tools
  • Do not connect to public Wi-Fi when handling sensitive data
  • Follow secure remote access procedures
  • Report any suspicious network activity or malware
  • Regular security awareness training is mandatory

Email & Communication Security

Secure practices for email and other communication channels.

  • Be cautious of phishing emails and suspicious links
  • Verify sender identity before opening attachments
  • Do not share sensitive information via email unless encrypted
  • Use company email for business purposes only
  • Report suspicious emails to IT security immediately
  • Do not click on links from unknown or untrusted sources
  • Use secure communication channels for sensitive discussions
  • Follow email retention and archiving policies

Incident Response

Procedures for reporting and responding to security incidents.

  • Report security incidents immediately to IT security or management
  • Do not attempt to investigate or fix security issues yourself
  • Preserve evidence if possible (screenshots, logs, etc.)
  • Follow incident response procedures as directed
  • Cooperate with security investigations
  • Document all security incidents for review
  • Learn from incidents to prevent future occurrences
  • Maintain confidentiality during incident investigations

Reporting Bugs & Security Issues

How to report security vulnerabilities, bugs, and security-related issues responsibly.

  • Email all bug reports and security-related issues to: security@arvyo.com
  • Include detailed information about the issue (steps to reproduce, affected systems, etc.)
  • For security vulnerabilities, do not publicly disclose until we have addressed the issue
  • We appreciate responsible disclosure and will acknowledge valid reports
  • Include your contact information if you would like to be credited or updated on the resolution
  • Report issues promptly to help us maintain the security of our systems and services

Report security concerns, bugs, or vulnerabilities

security@arvyo.com